Conspiracy Theories Weaponized conspiracies (for example QAnon) have been spreading in the US and globally. The malign information disseminated by [...]
Cybersecurity Products In order to facilitate safe and secure Internet infrastructures, many corporations and individuals use technical tools and security [...]
Pocket Security This project identifies the social factors that influence smartphone cybercrime victimization. We collect user activity data “in the [...]
Cybercrime Prosecution This project involves collecting ten years of data on cybercrime prosecution in cases against Fortune 1000 companies. This [...]